DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8c6325675c0eb195f74553963f53cc482ad6ff506c7365bc5f6b13e9c129f164.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c6325675c0eb195f74553963f53cc482ad6ff506c7365bc5f6b13e9c129f164.dll
Resource
win10v2004-20220812-en
Target
8c6325675c0eb195f74553963f53cc482ad6ff506c7365bc5f6b13e9c129f164
Size
54KB
MD5
91811f906fbbe3112ebf5a777bf02860
SHA1
07cd4e38dd5e15a6116f1ca94129b40725a6221b
SHA256
8c6325675c0eb195f74553963f53cc482ad6ff506c7365bc5f6b13e9c129f164
SHA512
edf2aaf7da96b5da4bb26540916e2fe3b36431f604b30260ec20ad71c5c929a5656119e138c970f68822be29ddfa1538df5f950f3bd57c788d14512142be9d2b
SSDEEP
768:mykqyQPttw3RpLOFfvNhxVEF2eiHCjMAqxnjGSqzbJUlUtdy8hl995jSHmHBZBAJ:RkqyQLG0fvNTk2eiHCj/qFGSorNlY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ